Premium Essay

Assmt

In:

Submitted By kendout
Words 878
Pages 4
Component 4/Unit 4
Self-Assessment Key

Multiple Choice. Select the correct answer.

1. There are two types of software: application and _________ software.
a. System
b. Multimedia
c. Process
d. Utility

Answer: a

Objective(s): a
Lecture(s)/Slide(s): 1/3

2. Which of the following is NOT a form of software that is free?
a. Public Domain
b. Open Source
c. Packaged
d. Freeware

Answer: c

Objective(s): b
Lecture(s)/Slide(s): 1/4

3. Which of the following is an example of business software?
a. Video games
b. Electronic medical records
c. Recipe manager
d. Project management software

Answer: d

Objective(s): b
Lecture(s)/Slide(s): 1/5 - 9

4. Which of the following is NOT an example of word processing software?
a. Microsoft Word
b. OpenOffice Impress
c. OpenOffice Writer
d. Corel WordPerfect

Answer: b

Objective(s): b
Lecture(s)/Slide(s): 1/6

5. Select all of the following that are examples of communications applications.
a. Email
b. Web browsers
c. Blog
d. Wiki

Answer: a, b, c, d

Objective(s): b
Lecture(s)/Slide(s): 1/16

6. Select all of the following that are examples of healthcare software.
a. EHRs and EMRs
b. Health Information Systems
c. Imaging
d. Statistical software

Answer: a, b, c

Objective(s): b
Lecture(s)/Slide(s): 1/17

7. Which of the following is NOT true about an operating system?
a. It is a set of programs that coordinate all activities of hardware resources.
b. It is the layer between the application software and the hardware.
c. It is unique to each individual computer hardware system.
d. There is only one operating system available for all computers.

Answer: d

Objective c
Lecture(s)/Slide(s): 2/4

8. A ________ interface is one where the user types in all the commands.
a. Command line
b. Graphical User
c. BIOS
d. Windows

Answer: a

Objective(s): c

Similar Documents

Premium Essay

Assmt

...Information Management Analysis and Design – Assignment Name: Pratap badikinti 1. It has been said that a Smartphone is “a microcomputer in your hand.” Discuss the security implications of this statement. Most people are unaware that their cell phones are just as vulnerable to cyber attacks as their laptops or desktops. Today, Smartphones have become most popular target among hackers and malware producers. The most common threat to the security of our cell phones is simply for the device to fall into wrong hands. Data theft begins with lost or stolen phones in most cases. Thus, we have to be very careful and thoughtful as how we carry, where we place them while in public places for someone to easily grab or steal them. Due to increase in data theft through cell phones, Blackberry, iOS and Windows phones use a secure password feature to secure the data in our cell phones. And its our responsibility to use this feature and secure our passwords that they are not easily guessed or broken but are relatively complex. Similar to every computer or laptop, a strong password alone is not enough to protect our data/information, need an strong software to help us recover the lost or stolen data and to wipe it if one is unable to retrieve. In the same way our cell phones too need a line of software that will help to turn off the phone’s screen and disable it when the password input is incorrect, preventing an attacker from...

Words: 791 - Pages: 4

Premium Essay

King Tut -Assmt 1 Week 2

...Unsolved mysteries, especially those within ancient times, happen to be one of my most favorite subjects throughout school and even more so as personal interest. I chose the topic which involved the “Mummy’s Curse,” a series of unexplainable, unfortunate, or tragic events that happened to the people who were present at the opening of Tutankhamen’s tomb. Believed to be under a kind of enchantment, rumors of such misfortune by engravings have been proven untrue as science and technology, not to mention common sense, continued to enhance. For many years people deemed that the very act of entering into a King's tomb would inflict death upon them, in specific ways I might add. Coincidence of a mosquito bite on Lord Carnarvon's left cheek (which after his unraveling king Tut also possessed this mark) and along with inscriptions of impending death by wings, sparked even more rumors and notoriety of the Mummy's curse. Dr. Hans Merk, a dermatologist at the University of Aachen, Germany and a German microbiologist, G. Kramer, from the University of Leipzig both believe that the cause of the curse was to be blamed upon some type of mold spores such as anthrax. As anthrax is known to have existed in Ancient times, it is unclear whether it was purposely placed inside the tombs to ensure a "curse" upon looters, or if it was naturally created inside the tomb under the right conditions. Other researchers reported that bats inhabit many excavated burial chambers, and their droppings carry...

Words: 591 - Pages: 3

Free Essay

Change Management Best

...Change Management Best Practices for ERP Applications, An Internal Auditor's Perspective Jeffrey T. Hare, CPA CISA CIA ERP Risk Advisors Webinar Logistics • Hide and unhide the Webinar • • • control panel by clicking on the arrow icon on the top right of your screen The small window icon toggles between a windowed and full screen mode Ask questions throughout the presentation using the chat dialog Questions will be reviewed and answered at the end of the presentation 3 © 2012 ERPRA Presentation Agenda Overview: •Introduction •GTAG 2: What is it? •Internal Auditor Expectations •Common Change Management Challenges •Wrap Up / Q&A Note: CPE will be offered for those that answer at least 4 (of the 5) polls presented during the webinar. 4 © 2012 ERPRA Introductions Jeffrey T. Hare, CPA CISA CIA: •Founder of ERP Risk Advisors / Oracle User Best Practices Board •Written various white papers on Internal Controls and Security Best Practices in an Oracle Applications environment •Frequent contributor to OAUG’s Insight magazine •Experience includes Big 4 audit, 6 years in CFO/Controller roles – both as auditor and auditee •In Oracle applications space since 1998 – as client and consultant •Founder of Internal Controls Repository •Author Oracle E-Business Suite Controls: Application Security Best Practices •Contributing author Best Practices in Financial Risk Management •Published in ISACA’s Control Journal and ACFE’s Fraud...

Words: 1822 - Pages: 8